Review on secure data aggregation in Wireless Sensor Networks

Abstract Recent advances in wireless sensor networks ( WSNs) have inspired various new applications, including target tracking and monitoring of ecosystems. Nevertheless, a large amount of data energy consumption of WSNs is utilized by data communication. However, data aggregation techniques can eli...

Full description

Saved in:
Bibliographic Details
Published inIOP conference series. Materials Science and Engineering Vol. 1076; no. 1; p. 12053
Main Authors Abood, Mohammed Salah, Wang(王华), Hua, Mahdi, Hussain Falih, Hamdi, Mustafa Maad, Abdullah, Ahmad S.
Format Journal Article
LanguageEnglish
Published Bristol IOP Publishing 01.02.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Abstract Recent advances in wireless sensor networks ( WSNs) have inspired various new applications, including target tracking and monitoring of ecosystems. Nevertheless, a large amount of data energy consumption of WSNs is utilized by data communication. However, data aggregation techniques can eliminate redundant data being transferred back to the base station and thereby lessening the consumption of energy. Security features like data integrity, confidentiality and accumulation of latest data is of great importance if WSN is utilized in extremely hostile or remote settings whereby the sensors are vulnerable to node failure and breach. Currently, there is prospect for securing data aggregation using WSN. In light of this, security features in data aggregation using WSN will be examined in current study. Next, the adversarial model that can be used in any aggregation scheme is then evaluated. Moreover, the latest and most sophisticated secured data aggregation scheme, proposed will be examined and categorized into two groups which are classified according to the number of aggregator nodes and the existence of the verification term. In this paper, created a table that showed the advantages and limitations of each algorithm that was adopted by researchers, shown in Table 3. Last, a computational approach is recommended to build a modern design with minimal protection preconditions against various types of challenges. The conceptual framework aims to provide an advanced understanding and enable the process of evaluation.
ISSN:1757-8981
1757-899X
DOI:10.1088/1757-899X/1076/1/012053